Cloud & Computing
-
Next year will bring a complex mix of evolution, correction and convergence when it comes to AI. It will become more powerful, more personal and more ubiquitous — and also more expensive, more autonomous and more disruptive.
-
Minnesota Chief Transformation Officer Zarina Baber explains how modernizing not only IT but all executive agencies and moving to an agile product delivery model is driving maturity statewide.
More Stories
-
Lake Nona, a 17-square-mile pivate planned community near Orlando International Airport in Florida, is a citywide test site for “movement analytics” technology to better understand traffic and other forms of mobility.
-
A previously unknown flaw in IT management code was exploited to push ransomware around the world to servers that used the software and were connected to the Internet, according to researchers.
-
A U.S. House hearing last week heard testimony from experts who underlined the disconnect between federal, state and local IT as well as how leadership can stall efforts to improve digital user experience and cybersecurity.
-
A recently proposed New York bill could soon allow the state's IT office to select a third party to evaluate its IT infrastructure, which was stretched to the limit during COVID-19 pandemic response efforts.
-
Detroit CIO Beth Niblock is headed to Washington, D.C., to serve as CIO for the Department of Housing and Urban Development. Her successor will be Art Thompson, the city’s public safety IT and cyber security director.
-
A plan to modernize IT and better enable a work-from-anywhere posture in Santa Monica, Calif., served the city well when the COVID-19 pandemic reshuffled city services and how they are delivered.
-
The Big Easy isn’t the only city using chatbots to bridge equity gaps and provide more residents with the answers they seek on a 24/7 basis. Smarter chatbots are finding their places in public service.
-
To compete globally and optimize our nation’s productivity, America needs to invest quickly in its digital future by spending the money needed for public access to — and technical leadership in — the digital world.
-
Cyber criminals are finding workarounds to steal unemployment checks after the state increased security. The scam involves official-looking emails and phone calls to steal user login information.
-
Following a cyberattack that officials called a “sophisticated phishing attack,” the Cobb County Board of Commissioners is considering allocating the funds needed to create four new cybersecurity positions.
-
Zero-trust security depends on strong verification methods. Analyzing user behavior can help — if agencies have the automation power to make that data an asset, not a liability, said Palo Alto Networks’ Paul Calatayud.
-
Federal officials working to define standards and tackle unanswered questions around software supply chain security have their work cut out for them, said speakers during an R Street Institute panel.
-
New Mexico Gov. Michelle Lujan Grisham has announced several upcoming changes to the Department of Workforce Solutions to improve technology capabilities in handling unemployment insurance claims and reducing fraud.
-
The county recently migrated nearly 20 years worth of financial data into a new ERP system, a move officials hope will ensure improved efficiency across financial operations for years to come.
-
Georgia Gov. Brian Kemp named Shawnzia Thomas CIO earlier today, replacing longtime state CIO Calvin Rhodes. She starts in the role on July 1, bringing with her 13 years of experience working for the state.
-
Frederick County Executive Jan Gardner named David Maginnis as the county’s new chief information officer within the IT division. In addition, Erin White has been tapped to lead the finance division.
-
Last week, the Texas Department of Information Resources announced the relaunch of the state’s official website, texas.gov. The new design offers scalability for periods of high demand and a user-friendly layout.
-
Device owners statewide are encouraged to download an app that warns them about malicious links and apps and vulnerable Wi-Fi connections. User privacy has been a core tenet for the app’s design.